Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    84s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 21:34 UTC

General

  • Target

    431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe

  • Size

    219KB

  • MD5

    1dc0d08b42883b5181f03f7789fd0940

  • SHA1

    e0d0c5fba1838442e9d516e3ebb592824ff5c1a5

  • SHA256

    431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2

  • SHA512

    e04a9050860ac974b27d893d596fe16c0421d8ac0c9833b89503c54704a9b33cacac40fbeb44b04b2bfbac0b0070ba54667db577763dcb888fe4bbf194e85e88

  • SSDEEP

    6144:MseuA1t5U0Ta3K06bULdec4hhQ7l9qCaEs:KuAr5UU5BbULoc4hh+pi

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe
    "C:\Users\Admin\AppData\Local\Temp\431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Users\Admin\AppData\Local\Temp\DIQM\Mozilla-Thunderbird_081\431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe
      C:\Users\Admin\AppData\Local\Temp\DIQM\Mozilla-Thunderbird_081\431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe /path="C:\Users\Admin\AppData\Local\Temp\431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2504

Network

  • flag-us
    DNS
    dtrack.secdls.com
    431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe
    Remote address:
    8.8.8.8:53
    Request
    dtrack.secdls.com
    IN A
    Response
  • flag-us
    DNS
    dtrack.secdls.com
    431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe
    Remote address:
    8.8.8.8:53
    Request
    dtrack.secdls.com
    IN A
    Response
  • flag-us
    DNS
    api.v2.secdls.com
    431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe
    Remote address:
    8.8.8.8:53
    Request
    api.v2.secdls.com
    IN A
    Response
  • flag-us
    DNS
    track.v2.secdls.com
    431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe
    Remote address:
    8.8.8.8:53
    Request
    track.v2.secdls.com
    IN A
    Response
No results found
  • 8.8.8.8:53
    dtrack.secdls.com
    dns
    431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe
    63 B
    136 B
    1
    1

    DNS Request

    dtrack.secdls.com

  • 8.8.8.8:53
    dtrack.secdls.com
    dns
    431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe
    63 B
    136 B
    1
    1

    DNS Request

    dtrack.secdls.com

  • 8.8.8.8:53
    api.v2.secdls.com
    dns
    431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe
    63 B
    136 B
    1
    1

    DNS Request

    api.v2.secdls.com

  • 8.8.8.8:53
    track.v2.secdls.com
    dns
    431046097ad646ef0f18b14bdaf286c30b57f267279c121b07e7c5008130dfa2N.exe
    65 B
    138 B
    1
    1

    DNS Request

    track.v2.secdls.com

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\DIQM\Mozilla-Thunderbird_081\DomaIQ10.exe

    Filesize

    242KB

    MD5

    d065df740425479d50c90fd4b7bf0e1f

    SHA1

    d590fbc938934bf4bce9b1da2b5d0258a32c5153

    SHA256

    8a2b01932a72df982a4493f35f130127d6a406825cde0b70e4226e30b45d07c0

    SHA512

    169bff3556fac0da26490ab28b255fbadab72e6bc378e3bcc32bb04341bfcd147d06a069e7cc7c4212f911ada3088538e940c0907ca75739e06c72216e6ac7a8

  • C:\Users\Admin\AppData\Local\Temp\DIQM\Mozilla-Thunderbird_081\config.dll

    Filesize

    48B

    MD5

    5c0168240b05163c6e18379f85459d25

    SHA1

    563539de939fc674b32c113c76d7d24db656764c

    SHA256

    722baa0a7e61fd991691edb5ebb35067ef883599e39c3a75cf4a4f3fd872ef5c

    SHA512

    5679424d045bb942723dc8cc508339cee4772b6d8ff2f3fa2fcc79bf421449de2ebb1987194d28b86f4a40b011236d8a30134a5106af9ba39c763fb52773ffeb

  • C:\Users\Admin\AppData\Local\Temp\DIQM\Mozilla-Thunderbird_081\routes.dll

    Filesize

    253B

    MD5

    289c7270591d46dd34623e2c79052a84

    SHA1

    adbde0e0deabe7713e2b13efa7587c4f7d03dcea

    SHA256

    831b5ddcb0c8661242e7836c554eac792db5ee926935e91d9a51c45bf026bff5

    SHA512

    12227cf1b0b64a0ef58c858077233eb460eeb0d8b9e2bbc8eed6f993bda0db025ed5b657dbee5545d79bac4419681ede6e8736f31c12f77b6943114d10d42ccb

  • \Users\Admin\AppData\Local\Temp\nsyE7B2.tmp\NSISdl.dll

    Filesize

    14KB

    MD5

    a5f8399a743ab7f9c88c645c35b1ebb5

    SHA1

    168f3c158913b0367bf79fa413357fbe97018191

    SHA256

    dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9

    SHA512

    824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977

  • memory/2504-29-0x000007FEF6670000-0x000007FEF700D000-memory.dmp

    Filesize

    9.6MB

  • memory/2504-28-0x000007FEF6670000-0x000007FEF700D000-memory.dmp

    Filesize

    9.6MB

  • memory/2504-27-0x000007FEF6670000-0x000007FEF700D000-memory.dmp

    Filesize

    9.6MB

  • memory/2504-30-0x000007FEF6670000-0x000007FEF700D000-memory.dmp

    Filesize

    9.6MB

  • memory/2504-31-0x000007FEF6670000-0x000007FEF700D000-memory.dmp

    Filesize

    9.6MB

  • memory/2504-32-0x000007FEF6670000-0x000007FEF700D000-memory.dmp

    Filesize

    9.6MB

  • memory/2504-23-0x000007FEF692E000-0x000007FEF692F000-memory.dmp

    Filesize

    4KB

  • memory/2504-35-0x000007FEF6670000-0x000007FEF700D000-memory.dmp

    Filesize

    9.6MB

  • memory/2504-37-0x000007FEF6670000-0x000007FEF700D000-memory.dmp

    Filesize

    9.6MB

  • memory/2684-7-0x0000000002800000-0x0000000002801000-memory.dmp

    Filesize

    4KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.